Which can be done to secure the virtual terminal interfaces on a router?()A、Administratively shut down the interfaces.B、Physically secure the interfaces.C、Configure a virtual terminal password and login process.D、Enter an access list and apply it to the terminal interfaces using the access-class command.E、Create an access list and apply it to the terminal interfaces using the access-group command

Which can be done to secure the virtual terminal interfaces on a router?()

  • A、Administratively shut down the interfaces.
  • B、Physically secure the interfaces.
  • C、Configure a virtual terminal password and login process.
  • D、Enter an access list and apply it to the terminal interfaces using the access-class command.
  • E、Create an access list and apply it to the terminal interfaces using the access-group command

相关考题:

These books, ________ at any bookshop, will give you all the information you need. (A) you can get(B) that you can get(C) what you can get(D) which you can get

Those books, () at any bookshop, will give you all information you need. A、you can getB、that you can getC、what you can getD、which you can get

It is a kind of online service system, on which you can publish and exchange information with others who also are the members of the system.On which you can paste your articles and answer the questions asked by the members of the system and you can also look for help here.It isA.BBSB.WWWC.E-mailD.TELNET

Each student can have a terminal to use now, which can help them study.()

You can meet people()can possibly help you find a paid job later on.A. thatB. whoC. which

In which order can a resume be organized?

Which are the two options to which a menu can be assigned?() (Choose two.) A.menuB.functionsC.data groupD.responsibilityE.functional group

A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?() A. It enables an attacker to perform an IP sweep of devices.B. It enables a hacker to know which operating system the system is running.C. It can overflow the session table to its limit, which can result in rejection of legitimate traffic.D. It creates a ping of death and can cause the entire network to be infected with a virus.

Which of the following methods can move files in clear text and can be easily intercepted?() A.RSHB.SNMPC.FTPD.TELNET

That is the house _______ you can enjoy the scenery. A. in that B. that C. which D. from which

The truth is that it is only by studying history( )we can learn what to expect in the future. A.which B.and then C.that D.by which

Such changes can alter the social structure,()people to move.A、which leadingB、leadsC、which ledD、leading

Which are the two options to which a menu can be assigned?() (Choose two.)A、menuB、functionsC、data groupD、responsibilityE、functional group

Several @functions can execute multiple statements. Which one of the following initializes a variable and can increment in during the operation?()A、 @do B、 @for C、 @while D、 @dowhile

Application Control Engine (ACE) can check the health of servers and server farms by configuring health probes (which are sometimes referred to as keepalives). A probe can be one of many types. Which are valid ACE probes? ()A、 HTTPB、 Java scriptingC、 TCL scriptingD、 RADIUSE、 TACACS

Which of the following methods can move files in clear text and can be easily intercepted?()A、RSHB、SNMPC、FTPD、TELNET

To which of the following resources can a lock be applied?()A、RowB、AliasC、BitmapD、Column

which one of the following accurately describes field names?()A、they must be unique in a database  B、they can only be used once in a view  C、they can only used once on each form  D、they can be used mulriple times on a form

Which  statements are true regarding a tablespace()A、It can span multiple databases.B、It can consist of multiple data files.C、It can contain blocks of different sizes.D、It can contain segments of different sizes.E、It can contain a part of a nonpartitioned segment

Which two statements are true regarding a tablespace()A、It can span multiple databases.B、It can consist of multiple data files.C、It can contain blocks of different sizes.D、It can contain segments of different sizes.E、It can contain a part of a nonpartitioned segment.

多选题Which are the two options to which a menu can be assigned?() (Choose two.)AmenuBfunctionsCdata groupDresponsibilityEfunctional group

单选题Which of the following is not the advantage of the Internet?Athe news can be made more democraticBthe public can turn to different sourcesCthe public can get a chance to ask questionsDanything can be posted on the Internet for others to see

多选题Application Control Engine (ACE) can check the health of servers and server farms by configuring health probes (which are sometimes referred to as keepalives). A probe can be one of many types. Which are valid ACE probes? ()AHTTPBJava scriptingCTCL scriptingDRADIUSETACACS

单选题The minimum range at which a target can be detected is basically determined by which of the following?().ApersistenceBpulse repetition rateCpulse lengthDrotation rate

单选题A system administrator detects thousands of open idle connections from the same source.Which problem can arise from this type of attack?()AIt enables an attacker to perform an IP sweep of devices.BIt enables a hacker to know which operating system the system is running.CIt can overflow the session table to its limit, which can result in rejection of legitimate traffic.DIt creates a ping of death and can cause the entire network to be infected with a virus.

单选题Which of the following can NOT describe the man?ADesperateBThinCMiserableDConspicuous

单选题Where does the look-out man stand?().AIn positions in which the noises in the ship are least likely to interfere with the hearing of a fog signal and the man can see clearlyBIn positions in which the noises in the ship are much likely to interfere with the hearing of a fog signalCIn positions in which the hearing of a signal is reduced to a minimumDIn a position in which the man can see clearly

单选题The real poet is a master of words. He can _____ his meaning in words which sing like music, and which by their position and association can move men tears.AtransformBtransmitCmanifestDconvey